Monday , January 13 2025 4:09 PM
Home / Top 5 (page 2)

Top 5

Don’t Fall For This Dangerously Convincing Ongoing Phishing Attack

Security researchers have discovered a new phishing campaign targeting Gmail users, which is so convincing and highly effective that even tech-savvy people can be tricked into giving away their Google credentials to hackers. The attackers first compromise a victim’s Gmail account, and once they are in, they start rifling through …

Read More »

Critical PHPMailer Flaw leaves Millions of Websites Vulnerable to Remote Exploit

A critical vulnerability has been discovered in PHPMailer, which is one of the most popular open source PHP libraries to send emails used by more than 9 Million users worldwide. Millions of PHP websites and popular open source web applications, including WordPress, Drupal, 1CRM, SugarCRM, Yii, and Joomla comes with …

Read More »

DNSChanger Malware: Hijacking Routers to Target Every Connected Device

Next time when you see an advertisement of your favorite pair of shoes on any website, even if it is legitimate, just DO NOT CLICK ON IT. …Because that advertising could infect you in such a way that not just your system, but every device connected to your network would …

Read More »

Over 1 Million Google Accounts Hacked by ‘Gooligan’ Android Malware

If you own an Android smartphone, Beware! A new Android malware that has already breached more than 1 Million Google accounts is infecting around 13,000 devices every day. Dubbed Gooligan, the malware roots vulnerable Android devices to steal email addresses and authentication tokens stored on them. With this information in …

Read More »

GitLab Patches Command Execution Vulnerability

Developers with GitLab this week fixed a critical vulnerability in the open source repository management software that could have led to command execution and allowed an authenticated user to gain access to sensitive application files, tokens, or secrets. HackerOne cofounder Jobert Abma unearthed the vulnerability last week and reported it …

Read More »

Multiple Critical Remotely Exploitable Flaws Discovered in Memcached Caching System

Hey Webmasters, are you using Memcached to boost the performance of your website? Beware! It might be vulnerable to remote hackers. Three critical Remote Code Execution vulnerabilities have been reported in Memcached by security researcher Aleksandar Nikolich at Cisco Talos Group that expose major websites, including Facebook, Twitter, YouTube, Reddit, …

Read More »

How To Install R on Ubuntu 16.04

Introduction R is a popular open source programming language that specializes in statistical computing and graphics. It is widely used for developing statistical software and performing data analysis. R is easily extensible, and the community is known for continuously adding user-generated packages for specific areas of study, which makes it …

Read More »

Google Allo, WhatsApp, Messenger, Telegram; which is the best messaging app for you?

Google has launched a second messaging platform, Google Allo, soon after the launch of their dedicated video calling app in the form of Google Duo. This has suddenly made us aware of the sheer number of messaging apps in the market. There are way too many apps being offered and all of them, …

Read More »

Chainfire’s SuHide — Now You Can Hide Your Android Root Status On Per-App Basis

The man, the myth, the living legend—Chainfire—is back at it with yet another exceptionally-promising tool that will nicely play in concert with his magnum opus, SuperSU. It seems Chainfire is back at it again as he just announced its newest tool, dubbed suhide. What it does is simple, yet brilliant – …

Read More »

How to stop WhatsApp from sharing your personal data with Facebook

WhatsApp will start sharing data with its parent company Facebook shortly, in spite of the promises the company made when it was first acquired. Facebook will get access to your phone number and other data so that it can deliver better friend suggestions… and serve targeted ads. But you’ll be able …

Read More »